Computer Science ›› 2016, Vol. 43 ›› Issue (10): 172-176.doi: 10.11896/j.issn.1002-137X.2016.10.032
Previous Articles Next Articles
XU Yang, ZHU Dan, ZHANG Huan-guo and XIE Xiao-yao
[1] Li H,Sun W H,Li F H,et al.Secure and Privacy-Preserving Data Storage Service in Public Cloud [J].Journal of Computer Research and Development,2014,51(7):1397-1409(in Chinese) 李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409 [2] Hong H S,Sun Z X.Big data Storage Security Based on Cloud Computing [J].Journal of Nanjing University of Posts and Te-lecommunications(Natural Science),2014,34(4):26-32(in Chinese) 洪汉舒,孙知信.基于云计算的大数据存储安全的研究[J].南京邮电大学学报(自然科学版),2014,34(4):26-32 [3] Xiao D,Yang L,Liu C,et al.Efficient Data Possession Auditing for Real-World Cloud Storage Environments [J].Ieice Trans.inf.& Syst,2015,98(4):796-806 [4] An B Y,Gong Z,Xiao D,et al.Data Possession Audit with an Implicit Trusted Third-party for Cloud Storage [J].Journal of Harbin Engineering University,2012,33(8):1039-1045(in Chinese) 安宝宇,宫哲,肖达,等.具有隐式可信第三方的云存储数据持有性审计[J].哈尔滨工程大学学报,2012,33(8):1039-1045 [5] Qin Z G,Wang S Y,Zhao Y,et al.An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics [J].Journal of Computer Research and Development,2015,52(10):2192-2199(in Chinese) 秦志光,王士雨,赵洋,等.云存储服务的动态数据完整性审计方案[J].计算机研究与发展,2015,52(10):2192-2199 [6] Li M C,Zhang L,Guo C.Accurate Location in Batch Dynamic Provable Data Possession [J].Applied Mechanics & Materials,2014,51(3):9-12 [7] Li C L,Chen Y,Tan P X,et al.Towards Comprehensive Pro-vable Data Possession in Cloud Computing [J].Wuhan University Journal of Natural Sciences,2013,18(3):265-271 [8] Cash D,Küpü A,Wichs D.Dynamic Proofs of Retrievability via Oblivious RAM [J].Journal of Cryptology,2015,7881:1-36 [9] Wang Q,Wang C,Ren K,et al.Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing [J].IEEE Transactions on Parallel & Distributed Systems,2011,22(5):847-859 [10] Yang K,Jia X.An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing [J].IEEE Transactions on Parallel & Distributed Systems,2013,24(9):1717-1726 [11] Jiao W Z,Wang G Q,Zhai Z J,et al.Algebraic Signature based Data Possession Checking for Cloud Storage [J].Journal of Northeast Normal University (Natural Science Edition),2013,45(4):55-61(in Chinese) 焦文喆,王国庆,翟正军,等.云存储下基于代数签名的数据持有性检查方法[J].东北师大学报(自然科学版),2013,45(4):55-61 [12] Sun W,Zhu Z L.Graph Classification Algorithm based on Divide and Conquer Strategy and Hash Linked List [J].Computer Engineering & Science,2013,35(3):145-149(in Chinese) 孙伟,朱正礼.基于分而治之及Hash链表的图分类算法[J].计算机工程与科学,2013,35(3):145-149 [13] Ameen J N,Mohamed J J,Begam N N.Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing [J].Compusoft International Journal of Advanced Computer Technology,2014,3(6):263-272 [14] Ni J B,Yu Y,Mu Y,et al.On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage [J].IEEE Transactions on Parallel & Distributed Systems,2014,25(10):2760-2761 [15] Huang Zhi-hong,Wu Li-li,Zhang Bo.Network Security Threats and Prevention on Cloud Computing[J].Journal of Chongqing University of Technology(Natural Science),2012,6(8):85-90(in Chinese) 黄志宏,巫莉莉,张波.基于云计算的网络安全威胁及防范[J].重庆理工大学学报(自然科学版),2012,6(8):85-90 |
No related articles found! |
|